Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitLab's CISO Josh Lemos on the pros and cons of making security practices public

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Josh Lemos, CISO at GitLab. Throughout his 15-year career in security, Josh has led teams at ServiceNow, Cylance, and Square. Known for his expertise in AI-driven security strategies, Josh is also a board member with HiddenLayer. He drives innovation at GitLab with a relentless focus on offensive security, identity management, and automation.

A masterclass in PAM implementation: Key factors and common pitfalls | Webinar

Over the last couple of decades, ManageEngine has successfully implemented PAM across various industries and helped organizations of all sizes secure their privileged access while improving operational efficiency. This webinar will help you learn real-world insights, key factors, and common pitfalls to keep in mind when implementing privileged access management solutions.

Connect, protect and build digital environments with real business results

Don’t let network complexity hold back your app modernization, AI adoption, and other digital projects. Cloudflare’s connectivity cloud is a unified platform that enhances how you connect, protect and build your digital environment. See how you can get secure, low-latency, and infinitely scalable connectivity across networks, applications, and users.

One Identity Fabric: Integrated solutions with responsible AI

Deploy a cloud-native solution at record time and low cost – One Identity CEO Mark Logan explores the benefits of One Identity Fabric to your environment. Join Mark Logan, CEO at One Identity, to delve into the use of best-in-class artificial intelligence (AI) within One Identity solutions.

April 28, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: POC Exploit Released for Erlang CVSS 10 Vulnerability The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication. NTLM Hash Leaking Vulnerability Actively Exploited Checkpoint researchers report that they have detected active exploitation of CVE-2025-24054, a hash disclosure via spoofing vulnerability that was patched as part of Microsoft’s March patching cycle.

SASE Talks on the Couch with Cato Networks' Abraham Gonzalez

Abraham’s got years of field experience, and he knows why customers hesitate: promises that never deliver. But once they see Cato in action, their perspective shifts completely. Watch below as Abraham shares a memorable moment when Cato made a customer's phone system work for the first time, all while delivering simplicity, power, and results. Ready to see a true SASE platform in action? Book a demo today.

Can This AI Save My Job? (Google Gemini 2.5 Pro)

In this video, I’ll be putting Google’s Gemini 2.5 AI to the test — challenging it to generate 100% secure and safe code for a note taking application. The catch? My job is on the line... and the code has to pass all security checks to avoid critical vulnerabilities. I’ll be diving into how Gemini 2.5 performs under pressure and examining whether AI can truly be trusted with secure coding. Resources.